Monday, April 28, 2008

THE NET: TO CUT OR NOT TO CUT?




Stories by Rozana Sani



Ruby feels the moves taken to censor the Internet are doomed for failure.


Muhamad Akmal says objectionable info can be countered with feedback.


Chan cites learning to recognise what is right or wrong is important.


Abdul Samat thinks that self-censorship is the most practical method.


Internet censorship seems to be gaining momentum as there is growing concern that certain information on the Web could lead to various sensitivities related to religious, moral, social, financial and political issues. Is this a step in the right direction, or another pointless exercise?

Blocking bad vibes



THE online environment where there is a free flow of information contains both good and bad, depending on one’s point of view. Some believe the “bad” content need to be controlled or suppressed from being accessed by the general public to stem negative actions or reactions – hence, the measure to censor the Internet as in the case of Indonesia and France.

Others think censorship of information is futile due to the underlying distributed technology of the Internet. For example, residents of a country that bans certain Web sites can easily find the content on servers outside the country. Hence, the need for other types of measures.

Trained architect, businesswoman and self-confessed serial blogger Ruby Ahmad strongly feels the moves taken to censor the Internet are all doomed for failure.

“We live in a highly wired, interconnected world and I can only think of one way to prevent users from not using the Internet ‘correctly’, and that is by preventing them from buying or using computers,” she said, tongue-in-cheek.

“Unsavoury content is deemed disgusting and unacceptable to some, but is very acceptable to others. It’s like the durian. I heard a food critic described it as perhaps the most revolting thing on earth. But personally, I quite like the D22!

“Law enforcement as an effective way to filter content is only possible if there is a unified global law in place. This is not possible as all countries have their separate agendas, goals, aspirations and other differing reasons,” she continued.

Student Muhamad Akmal Mohammad said rather than rely on content censorship which has technology limitations and inadequacies, a piece of objectionable information can be countered with feedback. This should be done in an intelligent manner, like answering the issues which were expressed by videos in YouTube, by producing videos, or maybe research papers.

“When it comes to sensitive issues, it is normal to see people get angry. It is, in fact, necessary to get angry to show that we are concerned about the issue, but being angry alone won’t help much in dealing with such issues and situations. Speculations arouse because people want to talk about something, but they actually don’t know much about it. Or even if they do know, they only know about it on the surface.

“If we are to provide them with what’s what, how’s how and why’s why regarding the issues they are speculating, we are actually doing two things here: putting a full-stop on the speculation, and spreading the truth. Isn’t that good?” said Muhamad.

For Janet Chan, chief executive officer of interactive marketing specialist Tyraco Sdn Bhd, learning to recognise what is right and what is wrong is the only way to avoid the negative impact of the Internet.

“The Internet, in my opinion, should not be barred as a medium unless it is necessary to keep check and balance of the most precious things on earth – which is life itself,” she shared.

Chan said a person would only know if something is right or wrong when he or she is exposed to, told or learn through experiences. And there is experience in abundance on the Net.

“Sometimes right or wrong can be very subjective in many different cultures on different things. Things could be white for me and white means good and black is considered bad or evil for many. But in some cultures, black means good and brave and white is the other way round, etc. The Internet can provide that kind of exposure for us to learn from different opinions and point of views,” she said.

Meanwhile, blogger Abdul Samat Kasah feels that Net censorship is not a long-term solution pertaining to issues like religion sensitivities, hate speech, pornography, excessive violence, bomb-making instructions, and information about crime, violence and drug use. Self-censorship, he feels, is the most practical method to overcome the woes of restricting or regulating Internet access.

“People would know what is on a particular site if they already knew how to get there. It is their responsibility to make their own decisions as to whether or not this material is appropriate for them. If they feel there is a possibility they might be appalled by this material, they can choose not to view it.

“If people are not sure about this material, or if they are in favour of it, then they take an acceptable risk when they choose to view it. Undoubtedly, this material should not be censored merely because some people cannot make rational decisions for themselves,” he said.

In conclusion, where restricting or regulating Internet access is concerned, Malaysia has to strike a balance where in one hand, we would like to narrow the digital divide and on the other hand, we want to take back what is given, he added.


SELF-REGULATION SHOULD BEGIN AT HOME

IN Malaysia, matters involving objectionable online content is governed by the Communications and Multimedia Act 1998 (CMA ‘98) that covers the main areas for electronic content issues. There is also the Malaysian Communications and Multimedia Content Code (Content Code), enforced by the Communications and Multimedia Content Forum of Malaysia (CMCF), covering the do’s and don’t’s that is to be adhered to by the communications and multimedia industry.

According to CMCF’s executive director Mohd Mustaffa Fazil Mohd Abdan, the body had received several complaints on issues over Internet content that took various forms in the past.

Where complaints were of a seditious nature, inciting racial disharmony or in any other form that contravenes the provisions of the Act that is further expanded by the Content Code, the CMCF will take the necessary action via its Complaints Bureau.

“Through the bureau, appropriate actions may be taken by either the CMCF itself or the case may be referred to the Malaysian Communications and Multimedia Commission (MCMC), or even the complainant may be advised to lodge a police report if need be. We may also liaise with our members who are specialists in the industry to advise and implement any action to be taken,” he said.

“As the public may be unaware of our role, the number of complaints received have not been immense. However, we hope to change this through future awareness programmes,” he added.

Mohd Mustaffa said the CMCF is a strong proponent of having “self-regulation” in place for the industry.

“As we are the designated body for industry self-regulation, we continuously urge the industry and members of the public to exercise it. The key to self-regulation is that it begins at home,” he stressed.

As for the content, whether it may be “savoury” or “unsavoury”, it may be accessed with considerable ease nowadays. The responsibility to ensure that only desirable content is consumed lies with the individual. An individual should be his or her own moral guardian and to those under their respective care (for instance, children, students, etc).

“This is where the Content Code exists to provide a platform of guidance for the public and industry to determine what kind of content is considered desirable and acceptable,” said Mohd Mustaffa.

Individuals can play his or her part in dealing with “unsavoury” content via self-regulation or by lodging a complaint with the CMCF Complaints Bureau in writing, e-mail to secretariat@cmcf.org.my or filling out the online complaints form available on www.cmcf.org.my.

“In the global sphere, should there be any offences that may be committed abroad and having its effect locally, the CMCF will work with the MCMC as the appropriate body to deal with such issues,” he added.

THE NET: TO CUT OR NOT TO CUT?




Tech&U Channel of New Straits Times today's edition (Monday, April 28,2008)is featuring an article (cover story) entitled "THE NET: TO CUT OR NOT TO CUT". Several comments by the general public, including my comments are featured inside the article.

The article is written by Tech&U editorial, Rozana Sani. To know more about the contents of the article please get a copy of today's edition of NST newspaper. The full article will be published in this blog tomorrow (Tuesday, April 29, 2008). - Blog Administrator

Thursday, April 24, 2008

E-mail Hijacking / Friend Scams


How it was done?

Furtherance to the email I received from Anthony Lammert, I just would like to elaborate a little bit of what he meant by “Only an artful 'IT savy tech’ person would be able to circumscribe 'through the back door' to obtain such data!” The technique used to obtain data from the back door is called phishing or key logger. For the benefit of readers who are not familiar with the terminology, I have the pleasure to provide a little bit of information on E-mail Hijacking / Friend Scams as what happened to our unfortunate friend a couple of days ago.

Some fraudsters hijack existing e-mail accounts and use them for advance fee fraud purposes. The fraudsters e-mail associates, friends, and/or family members of the legitimate account owner in an attempt to defraud them. This ruse generally requires the use of phishing or keylogger computer viruses to gain login information for the e-mail address.

Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait

Phishers use a number of different social engineering and e-mail spoofing ploys to try to trick their victims. In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients' AOL accounts. The perpetrator's e-mail used AOL logos and contained legitimate links. If recipients clicked on the "AOL Billing Center" link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (PINs) , social security numbers, banking numbers, and passwords. This information was used for identity theft.

A phishing technique was described in detail as early as 1987, while the first recorded use of the term "phishing" was made in 1996. The term is a variant of fishing, probably influenced by phreaking, and alludes to the use of increasingly sophisticated baits used in the hope of a "catch" of financial information and passwords. The word may also be linked to leetspeak in which ph is a common substitution for f. Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term "whaling," has been coined for these kinds of attacks

The readers are advised to be suspicious of any official-looking e-mail message that asks for updates on personal or financial information and urges recipients to go directly to the organization's Web site to find out whether the request is legitimate.

Wednesday, April 23, 2008

Email RECEIVED FROM AUCKLAND, NEW ZEALAND

Depicted below is an email I received from New Zealand pertaining to the Nigerian Scam. The same email was sent to Frisco and several other recepients. It seems the scam is going global and readers are advice to be vigilant for such emails. Thank you.

QUOTE : from: Anthony Lammert
date : Wed, Apr 23, 2008 at 11:53 AM
subject : Re: Scam
mailed-by : gmail.com

11:53 AM (5 hours ago) Reply

Good day!
Well,well Fris, I got this 'anon plea' through our good kawan true email yesterday and by the very familiar art of writing, and from Nigeria too, I knew for once it's just a BIG SCAM indeed! The likelihood of this Niger trickster in obtaining our good friend's particular could be from his www portal.(as it is a public domain). Only an artful 'IT savy tech person' would be able to circumscribe 'through the back door' to obtain such data! In Nigeria it's soooo easy to open a bank acc. by using assumed names and in this case it's a 'so-called hotel manager' acting as 'proxy' of our good friend! So, be smart and don't get caught! But. who's in the right mind would send such considerable sum to a suspiciuos bank acc.?

Cheers all!
Antonio, St Johns, Auckland - UNQUOTE

BE WARNED OF THE NIGERIAN SCAMMER










F.C. Salleh Salam (pic). Click here to access his blog.


I was on my way to KL yesterday (Tuesday, April 22, 2008) sending my daughter to her office in Jalan Raja Chulan when I received a SMS from F.C. Salleh Salam (Frisco), a close friend of mine in Kota Kinabalu. I was talking to myself, it was rather awkward for Frisco to send me a SMS that early in the morning (07:46HRS) that was after glancing at my PDA screen that the SMS came from him. Too early also for SMS jokes unless he is in a different time zone. After reaching my daughter’s office, I stopped for a while to read the message and the SMS read “Askum. I wrote email to you urgent. Have you read? What say you.”

After reaching home in Subang Jaya, I switched on my pc, opened my email and as usual I have lots of emails from friends and associates flagged as unread. I opened the email from my friend Frisco and it read like this:

QUOTE: Samat. I don't really know if this letter is genuinely written by our friend, (friend’s name). I've been receiving emails from him earlier which appear normal. We were supposed to meet up tomorrow for the first time, and he gave me a number to call. Suddenly I have this email which clocked him at 4:39 am, just about an hour from now. It seemed real as the English sounds like him, but I am not too sure firstly, about the method of payment is the way how to send as well. Secondly, I am certain he would be able to call the embassy for help if his problem is real. Thirdly, I am certain he has other friends and relatives upon which he can also seek immediate assistance. Maybe he was too embarrassed but if you are in trouble what is there to feel shy about. Whatever do CALL me when you receive this, although he did not want anyone to disclose to anyone but I feel a few things are not that right and I would like your opinion. Naturally I would like this email be kept secret from him whatever the situation as I trust you. Indeed if he needs help right now, He could be genuinely in Ghana and his email address and password was stolen as these people are capable of. But for mere $800 request is no big deal. I can do something but unfortunately I have an appointment to visit the Padas gorge by which we will be leaving KK by 8. Do call me ASAP.UNQUOTE

The email Frisco received purportedly from our friend is as follows:

Date: Tue, Apr 22, 2008 at 4:39 AM
Subject: Emergency
To:

How are you doing today? I am sorry I didn't inform you about my travelling to Africa for a program called "Empowering Youth to Fight Racism, HIV/AIDS, Poverty and Lack of Education, the program is taking place in three major countries in Africa which is Ghana, South Africa and Nigeria. It had been a very sad and bad moment for me here; the present condition that I found myself is very difficult for me to explain.

I am really stranded in Nigeria at this moment because I forgot my little bag in a Taxi where my money, passport, documents and other valuable things were kept on my way to the Hotel I am staying, I am facing a hard time and lots difficulties here because I have no money on me. I now owe a hotel bill of $850.85 and they wanted me to pay the bill soon else they will have to get me embarrassed up and detained by the hotel management. Please I need urgent help from you, I only need you to help me with the hotel bill and I will also need $800 to feed and help myself back home. I had been to the State Embassy and they were so kind to assist me with some money and I paid part of the hotel bill.

Please can you help me with a sum of $1,500 to sort out my problems here and get back home, I don't even have money to feed myself for a day, which I had to starve for many days if I continue staying here. Kindly help me transfer some money as soon as you got my e-mail either through the Western Union or Money Gram to re-arrange from my misfortune here and help myself get back home soon.

Try to understand how bitterer I feel this moment I'm writing you. I needed this help so much and on time to get out of this mess because I am in a terrible and tight corner right now. Also thank the hotel manager "Mr. John Ken" he had so much helped me here, he assisted talked to the hotel management behalf before they extended my days of staying even after my misfortune until I get in touch with any of the friends that cares to help me out here. Please don't feel so much bothered in case you called and couldn't hear from me because many a times the hotel management does not allow emergency calls here due to languages involved and other security reasons, I am alright presently all I needed right now is your financial aid to sort things out here and get back home safely.

I am sending you this e-mail from the city local Library and I only have 30 min, I will appreciate what so ever you can afford to send me for now and I promised to pay back your money as soon as I get back home, I'm forwarding along with my personal details for you to go any Western Union or Money-gram immediately and transfer the money because I need to be safe here and get back home shortly. It very unfortunate i lost all my contact with most Friends that would so much loved helping me back home if they get to know this. I will contact to create your awareness immediately I received the funds. I am so much glad I contacted you in a bad moment like this because of your concern and lovely care.

Please if you really care for me, want me happy and need me safe back home; kindly take my below details to the nearest Western Union or Money Gram and Transfer some money for me to pay the hotel bill and return home. You can get back to me through the e-mail or the hotel manager "MR.JOHN KEN" regarding the MTCN for pick up as soon as you transfer the money.

Please don't disclose my request before friends, just keep everything within yourself until I get back I will explain better. Below are my details you can transfer the money so that i will return home happily. Take this to the Western Union OR Money Gram immediately you got my e-mail.

Thanks allots for your care and concern helping me back home.

Details You Need Now;
Full Name: (friend’s name)
TEXT QUESTION: Who is the Receiver
ANSWER: (friend’s name)
Country&Code: Nigeria / 23401
Address:23/25, Maryland Street, MI NIGERIA
Hotel Name: Quarter Jack Mild Int'l Lodge & Suits
Hotel Line: +234-705-5610-969, +234-806-5261-102

Best Regards
(friend’s name)

When I browsed further in my Inbox, I found out one email was marked from our friend in “dilemma”. When I opened the email, it was exactly similar to what Frisco received. The email came with his legitimate email address and his full name. So, Frisco and I traded some SMS just to ascertain that our friend is alright.

Be warned that the above email is a SCAM. Frisco and I did some investigation ourselves where Frisco found out that our friend is “alive and kicking” in Kota Kinabalu and at the same time I found this information. Please click here for explanation that cleared our worries.

How did thing like this happened? For our friend’s case, there is a legitimate explanation as told by him to Frisco. He lost his PDA while in KL. That could be the explanation, particularly when passwords and other critical information are stored inside the PDA. Once lost, many times shy.

So my advices to the readers are (a) Please change you email password regularly and ATM, credit cards passwords as well and all other passwords for that matter. (b) Never store critical information in your PDA or hand phone. Of course it is very handy to have everything in a single gadget but the repercussions are agonising.

If you received similar emails as mentioned above please do not deposit any money to the said account, no matter how in sympathy are you for a friend in need. Please verify accordingly.

Tuesday, April 1, 2008

Reaping the Benefits Quoted by CNN





CNN












CNN websites quoting Reaping the Benefits. Please click here. Avilable for a limited period of time only.







The article entitled FITNA - ANTI-ISLAM FILM BY Geert Wilders as featured in Reaping the Benefits has been quoted by CNN today. The readers may access CNN website which quoted Reaping the Benefits by clicking here then click From the Blogs as shown in the page.